General

  • Target

    1952-57-0x0000000000400000-0x0000000000466000-memory.dmp

  • Size

    408KB

  • MD5

    8226085f4bb0deab0aec38481ad745a2

  • SHA1

    c5ca7a0c0b90b8e560167d75dcff00934023b7a8

  • SHA256

    4fde9583a3deab45d6ae0ca493a0e1827084077c118c73f9d653efefc0046353

  • SHA512

    a092b6ee8a2fa1e0439bbb8207fec000e839088a079a0e974f3928407143f39debe045c089db390d5041c0805a10197db2290a886bace6383c5ba871cf164429

  • SSDEEP

    6144:uWo/UgUj2Bzq7QgpoAvnhAp081nNVjqKoe:K//UEzWDp/v6nnjqKoe

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.code-jet.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    j[~,i~WZdomJ

Signatures

Files

  • 1952-57-0x0000000000400000-0x0000000000466000-memory.dmp
    .exe windows x86


    Headers

    Sections